-
Identity RadicalsThe SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon
Learn more -
ComplianceDOJ’s Bulk Data Transfer Rule: Why Identity Visibility is Now a Compliance Requirement
Learn more -
Identity SecurityIntroducing VQL – Veza Query Language
Learn more -
Identity RadicalsOvercoming Identity Silos: Toward Unified Identity Security
Learn more -
Identity RadicalsThe Security Paradox of Data and Digital Transformation
Learn more -
Identity SecurityPrivilege Creep: What It Is and How To Prevent It
Learn more -
Identity SecurityThe NHI Iceberg: Veza NHI Security brings visibility and actionability of the hidden risks across the enterprise
Learn more -
AIVeza Access AI Powered Universal Search for all Identity Security Use Cases
Learn more -
IAMEnrichment Rules in Veza: Automating Context for Smarter Identity Governance
Learn more






